Eavesdropping attacks in underwater acoustic networks

Qiu WANG, Hong Ning DAI, Xuran LI, Hao WANG

Research output: Book Chapters | Papers in Conference ProceedingsConference paper (refereed)Researchpeer-review

1 Citation (Scopus)

Abstract

This paper investigates the eavesdropping attacks in underwater acoustic networks (UANets). In particular, we propose an analytical framework to model the eavesdropping attacks in UANets in terms of the eavesdropping probability. Results of extensive simulations match the analytical results, indicating the effectiveness and accuracy of our model. Besides, we also find that the eavesdropping probability in UANets heavily depends on the underwater acoustic channel characterizing by the acoustic signal frequency, the spreading factor and the distance between the transmitter and the eavesdropper. This study provides useful insights that will help us to design anti-eavesdropping schemes with a better protection on the confidential communications.

Original languageEnglish
Title of host publication2015 10th International Conference on Information, Communications and Signal Processing, ICICS 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467372183
DOIs
Publication statusPublished - 26 Apr 2016
Externally publishedYes
Event10th International Conference on Information, Communications and Signal Processing, ICICS 2015 - Singapore, Singapore
Duration: 2 Dec 20154 Dec 2015

Publication series

Name2015 10th International Conference on Information, Communications and Signal Processing, ICICS 2015

Conference

Conference10th International Conference on Information, Communications and Signal Processing, ICICS 2015
Country/TerritorySingapore
CitySingapore
Period2/12/154/12/15

Bibliographical note

Publisher Copyright:
© 2015 IEEE.

Keywords

  • Eavesdropping
  • Security
  • Underwater acoustic networks

Fingerprint

Dive into the research topics of 'Eavesdropping attacks in underwater acoustic networks'. Together they form a unique fingerprint.

Cite this